-
1
-
-
84855716153
-
-
CogNea: Cognitive Networking Alliance. http://www.cognea.org/.
-
-
-
-
2
-
-
84855701127
-
-
FCC, ET Docket No FCC 08-260, November 2008
-
FCC, ET Docket No FCC 08-260, November 2008.
-
-
-
-
3
-
-
79960680228
-
-
FCC, ET Docket No FCC 10-174, September
-
FCC, Second Memorandum Opinion and Order, ET Docket No FCC 10-174, September 2010.
-
(2010)
Second Memorandum Opinion and Order
-
-
-
5
-
-
84855702887
-
-
Microsoft Research WhiteFi Service. http://whitespaces.msresearch.us/.
-
-
-
-
6
-
-
84855702892
-
-
S. 649: Radio Spectrum Inventory Act
-
S. 649: Radio Spectrum Inventory Act. http://www.govtrack.us/congress/ bill.xpd?bill=s111-649.
-
-
-
-
7
-
-
84855701131
-
-
Trusted Computing Group. http://www.trustedcomputinggroup.org/.
-
-
-
-
8
-
-
33745648091
-
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey
-
DOI 10.1016/j.comnet.2006.05.001, PII S1389128606001009
-
I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty. Next generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Computer Networks, 50(13):2127-2159, 2006. (Pubitemid 43975031)
-
(2006)
Computer Networks
, vol.50
, Issue.13
, pp. 2127-2159
-
-
Akyildiz, I.F.1
Lee, W.-Y.2
Vuran, M.C.3
Mohanty, S.4
-
9
-
-
0036530960
-
Experimental analysis of the joint statistical properties of azimuth spread, delay spread, and shadow fading
-
DOI 10.1109/49.995511, PII S0733871602032948
-
A. Algans, K. Pedersen, and P. Mogensen. Experimental analysis of the joint statistical properties of azimuth spread, delay spread, and shadow fading. IEEE Journal on Selected Areas in Communications, 20(3):523-531, Apr. 2002. (Pubitemid 34554892)
-
(2002)
IEEE Journal on Selected Areas in Communications
, vol.20
, Issue.3
, pp. 523-531
-
-
Algans, A.1
Pedersen, K.I.2
Mogensen, P.E.3
-
11
-
-
70450260682
-
White space networking with wi-fi like connectivity
-
P. Bahl, R. Chandra, T. Moscibroda, R. Murty, and M. Welsh. White space networking with wi-fi like connectivity. Proceedings of the ACM SIGCOMM 2009 conference on Data communication, pages 27-38, 2009.
-
(2009)
Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication
, pp. 27-38
-
-
Bahl, P.1
Chandra, R.2
Moscibroda, T.3
Murty, R.4
Welsh, M.5
-
13
-
-
33947612062
-
In-network outlier detection in wireless sensor networks
-
J. Branch, B. Szymanski, C. Giannella, R. Wolff, and H. Kargupta. In-network outlier detection in wireless sensor networks. Distributed Computing Systems, 2006. ICDCS 2006. 26th IEEE International Conference on, 2006.
-
(2006)
Distributed Computing Systems 2006. ICDCS 2006. 26th IEEE International Conference on
-
-
Branch, J.1
Szymanski, B.2
Giannella, C.3
Wolff, R.4
Kargupta, H.5
-
14
-
-
33144454801
-
Secure positioning in wireless networks
-
DOI 10.1109/JSAC.2005.861380
-
S. Capkun and J.-P. Hubaux. Secure positioning in wireless networks. Selected Areas in Communications, IEEE Journal on, 24(2):221-232, 2006. (Pubitemid 43269745)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 221-232
-
-
Capkun, S.1
-
16
-
-
38149046958
-
Defense against primary user emulation attacks in cognitive radio networks
-
Jan
-
R. Chen, J.-M. Park, and J. Reed. Defense against primary user emulation attacks in cognitive radio networks. IEEE Journal on Selected Areas in Communications, 26(1):25-37, Jan. 2008.
-
(2008)
IEEE Journal on Selected Areas in Communications
, vol.26
, Issue.1
, pp. 25-37
-
-
Chen, R.1
Park, J.-M.2
Reed, J.3
-
20
-
-
0004022867
-
-
John Wiley and Sons, Inc, New York, NY
-
M. Ghosh, N. Mukhopadhyay, and P. K. Sen. Sequential Estimation. John Wiley and Sons, Inc, New York, NY, 1997.
-
(1997)
Sequential Estimation
-
-
Ghosh, M.1
Mukhopadhyay, N.2
Sen, P.K.3
-
21
-
-
85011947838
-
Correlation model for shadow fading in mobile radio systems
-
M. Gudmundson. Correlation model for shadow fading in mobile radio systems. Electronics Letters, 27(23):2145-2146, 1991.
-
(1991)
Electronics Letters
, vol.27
, Issue.23
, pp. 2145-2146
-
-
Gudmundson, M.1
-
23
-
-
33745820773
-
Trust management for resilient wireless sensor networks
-
DOI 10.1007/11734727-7, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers
-
J. Hur, Y. Lee, S.-M. Hong, and H. Yoon. Trust management for resilient wireless sensor networks. Information Security and Cryptology - ICISC 2005, pages 56-68, 2006. (Pubitemid 44029524)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3935
, pp. 56-68
-
-
Hur, J.1
Lee, Y.2
Hong, S.-M.3
Yoon, H.4
-
24
-
-
84866469313
-
Serloc: Robust localization for wireless sensor networks
-
L. Lazos and R. Poovendran. Serloc: Robust localization for wireless sensor networks. ACM Trans. Sen. Netw., 1(1):73-100, 2005.
-
(2005)
ACM Trans. Sen. Netw.
, vol.1
, Issue.1
, pp. 73-100
-
-
Lazos, L.1
Poovendran, R.2
-
25
-
-
70350381132
-
Cumulative attestation kernels for embedded systems
-
Springer Berlin /Heidelberg
-
M. LeMay and C. Gunter. Cumulative attestation kernels for embedded systems. volume 5789 of Lecture Notes in Computer Science, pages 655-670. Springer Berlin /Heidelberg.
-
Lecture Notes in Computer Science
, vol.5789
, pp. 655-670
-
-
Lemay, M.1
Gunter, C.2
-
26
-
-
33144467507
-
Robust statistical methods for securing wireless localization in sensor networks
-
Z. Li, W. Trappe, Y. Zhang, and B. Nath. Robust statistical methods for securing wireless localization in sensor networks. IPSN '05: Proceedings of the 4th international symposium on Information processing in sensor networks, page 12, 2005.
-
(2005)
IPSN '05: Proceedings of the 4th International Symposium on Information Processing in Sensor Networks
, pp. 12
-
-
Li, Z.1
Trappe, W.2
Zhang, Y.3
Nath, B.4
-
27
-
-
49449086367
-
Attack-resistant location estimation in wireless sensor networks
-
July
-
D. Liu, P. Ning, A. Liu, C. Wang, and W. K. Du. Attack-resistant location estimation in wireless sensor networks. ACM Transactions on Information and System Security (TISSEC), 11:22:1-22:39, July 2008.
-
(2008)
ACM Transactions on Information and System Security (TISSEC)
, vol.11
, pp. 221-2239
-
-
Liu, D.1
Ning, P.2
Liu, A.3
Wang, C.4
Du., W.K.5
-
28
-
-
34548364110
-
Insider attacker detection in wireless sensor networks
-
DOI 10.1109/INFCOM.2007.225, 4215807, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
F. Liu, X. Cheng, and D. Chen. Insider attacker detection in wireless sensor networks. INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, pages 1937 -1945, May 2007. (Pubitemid 47334425)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 1937-1945
-
-
Liu, F.1
Cheng, X.2
Chen, D.3
-
29
-
-
77955196382
-
Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
-
Y. Liu, P. Ning, and H. Dai. Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures. IEEE Symposium on Security and Privacy (Oakland), 2010.
-
(2010)
IEEE Symposium on Security and Privacy (Oakland)
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
-
36
-
-
85008048349
-
IEEE 802.22: The first cognitive radio wireless regional area network standard
-
C. R. Stevenson, G. Chouinard, Z. Lei, W. Hu, S. J. Shellhammer, and W. Caldwell. Ieee 802.22: the first cognitive radio wireless regional area network standard. Communications Magazine, 47(1):130-138, 2009.
-
(2009)
Communications Magazine
, vol.47
, Issue.1
, pp. 130-138
-
-
Stevenson, C.R.1
Chouinard, G.2
Lei, Z.3
Hu, W.4
Shellhammer, S.J.5
Caldwell, W.6
-
37
-
-
67349280355
-
What is a spectrum hole and what does it take to recognize one?
-
May
-
R. Tandra, A. Sahai, and S. Mishra. What is a spectrum hole and what does it take to recognize one? IEEE Magazine Special Issue on Cognitive Radio, 97(5):824-848, May 2009.
-
(2009)
IEEE Magazine Special Issue on Cognitive Radio
, vol.97
, Issue.5
, pp. 824-848
-
-
Tandra, R.1
Sahai, A.2
Mishra, S.3
-
39
-
-
47249110641
-
Distributed software-based attestation for node compromise detection in sensor networks
-
Y. Yang, X. Wang, S. Zhu, and G. Cao. Distributed software-based attestation for node compromise detection in sensor networks. Reliable Distributed Systems, 2007. SRDS 2007. 26th IEEE International Symposium on, pages 219-230, 2007.
-
(2007)
Reliable Distributed Systems 2007. SRDS 2007. 26th IEEE International Symposium on
, pp. 219-230
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
-
40
-
-
43849098907
-
A trust based framework for secure data aggregation in wireless sensor networks
-
Sept.
-
W. Zhang, S. Das, and Y. Liu. A trust based framework for secure data aggregation in wireless sensor networks. Sensor and Ad Hoc Communications and Networks, 2006. SECON '06. 2006 3rd Annual IEEE Communications Society on, 1:60-69, Sept. 2006.
-
(2006)
Sensor and Ad Hoc Communications and Networks 2006. SECon '06. 2006 3rd Annual IEEE Communications Society on
, vol.1
, pp. 60-69
-
-
Zhang, W.1
Das, S.2
Liu, Y.3
|